JPH0527291B2 - - Google Patents

Info

Publication number
JPH0527291B2
JPH0527291B2 JP57216709A JP21670982A JPH0527291B2 JP H0527291 B2 JPH0527291 B2 JP H0527291B2 JP 57216709 A JP57216709 A JP 57216709A JP 21670982 A JP21670982 A JP 21670982A JP H0527291 B2 JPH0527291 B2 JP H0527291B2
Authority
JP
Japan
Prior art keywords
signal
circuit
discrete
random number
conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP57216709A
Other languages
Japanese (ja)
Other versions
JPS59107658A (en
Inventor
Yoshihiko Akaiwa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Electric Co Ltd filed Critical Nippon Electric Co Ltd
Priority to JP21670982A priority Critical patent/JPS59107658A/en
Priority to AU22257/83A priority patent/AU561204B2/en
Priority to CA000442943A priority patent/CA1206528A/en
Priority to GB08332970A priority patent/GB2132857B/en
Publication of JPS59107658A publication Critical patent/JPS59107658A/en
Publication of JPH0527291B2 publication Critical patent/JPH0527291B2/ja
Granted legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band

Description

【発明の詳細な説明】 本発明は、アナログ信号の秘話送受信装置に係
り、特に秘話同期が容易になる秘話送受信装置に
関する。通信の秘密を守るために、これまで種々
の秘話通信技術が開発されてきた。特に、アナロ
グ信号を秘匿化するための秘話技術は、その種類
が多い。秘話の目的を達するために、送話信号に
何らかの変換を行えばよいのであるが、秘話強度
を上げるためには、変換操作を時間的に変化させ
なければならない。受信側で秘話の逆変換を行つ
て送信信号を得るためには、送信側で時間ととも
に変化させた変換操作と同期して秘話逆変換を行
わなければならないので、受信側では、そのため
の同期をとる必要がある。
DETAILED DESCRIPTION OF THE INVENTION The present invention relates to a confidential message transmitting and receiving device for analog signals, and more particularly to a confidential message transmitting and receiving device that facilitates confidential message synchronization. Various confidential communication techniques have been developed to protect the confidentiality of communications. In particular, there are many types of secret techniques for concealing analog signals. In order to achieve the purpose of secret speech, it is sufficient to perform some kind of conversion on the transmitted signal, but in order to increase the strength of secret speech, the conversion operation must be changed over time. In order to obtain a transmitted signal by inversely converting the confidential message on the receiving side, the inverse confidential conversion must be performed in synchronization with the conversion operation that changed over time on the transmitting side. I need to take it.

従来のアナログ秘話技術においては、同期をと
るための信号をアナログ信号とは独立に送信して
いた。例えば、送信と受信側に別個に乱数発生器
を持つており、会話に先立ち、同期用の信号を送
信して、同期をとる方法や、送信アナログ情報と
ともに、同期信号を常に送信する方法が知られて
いる。同期信号は、秘話変換の周期に対応するも
のであるから、秘話強度を上げるためには、秘話
変換の周期を長くとる必要がある。その結果、同
期を確立するために長い時間を必要とすることに
なると同時に、複雑な同期回路を必要とする欠点
があつた。
In conventional analog secret communication technology, signals for synchronization were transmitted independently of analog signals. For example, there are separate random number generators on the transmitting and receiving sides, and we know how to synchronize by sending a synchronization signal before a conversation, and how to always send a synchronization signal together with the transmitted analog information. It is being Since the synchronization signal corresponds to the period of secret conversion, it is necessary to increase the period of secret conversion in order to increase the privacy strength. As a result, it takes a long time to establish synchronization, and at the same time, it requires a complicated synchronization circuit.

本発明の目的は、同期情報を伝送しなくとも送
信装置と受信装置との間で同期がとれる秘話送受
信装置を提供することにある。
An object of the present invention is to provide a confidential message transmitting/receiving device that can synchronize between a transmitting device and a receiving device without transmitting synchronization information.

本発明によれば、乱数系列を発生させる手段
と、該乱数系列によつて発生される離散値に対応
して、送信すべきアナログ信号に秘話変換を行う
手段と、前記乱数系列を暗号化する自己同期型の
暗号器と、該暗号器から得られる離散的信号と前
記秘話変換を行う手段から得られるアナログ信号
とを合成して得られる信号を送信する手段とを有
する秘話送信装置と、 前記秘話送信装置で行つた前記アナログ信号と
前記離散的信号の合成の逆操作を行うことにより
前記アナログ信号と前記離散的信号とを分離する
手段と、前記離散的信号の暗号復号化を行う復号
器と、該復号器から得られる信号によつて離散的
信号を発生させ、これに対応して、前記秘話送信
装置で行つた秘話変換の逆操作を行う手段とを有
し、これから得られる信号を受信アナログ信号と
することを特徴とする秘話受信装置と、 からなる秘話送受信装置が得られる。
According to the present invention, means for generating a random number sequence, means for performing secret conversion into an analog signal to be transmitted in accordance with the discrete values generated by the random number sequence, and encrypting the random number sequence. a private message transmitting device comprising a self-synchronizing encoder; and means for transmitting a signal obtained by combining a discrete signal obtained from the encoder and an analog signal obtained from the means for performing private conversion; means for separating the analog signal and the discrete signal by performing a reverse operation of combining the analog signal and the discrete signal performed by the confidential transmission device; and a decoder for decoding the discrete signal. and a means for generating a discrete signal using the signal obtained from the decoder, and correspondingly performing an inverse operation of the encrypted speech conversion performed by the encrypted speech transmitting device, and a means for generating a signal obtained from the discrete signal. A confidential message receiving device characterized by receiving an analog signal; and a confidential message transmitting/receiving device are obtained.

更に、本発明によれば、前記秘話変換を行う手
段で秘話変換を行うために発生させる離散値が乱
数系列をブロツク単位に区切ることなく連続して
入力されることによつて発生されることを特徴と
する秘話送受信装置が得られる。
Furthermore, according to the present invention, the discrete values generated for performing secret conversion by the means for performing secret conversion are generated by continuously inputting a random number sequence without dividing it into blocks. A secret message transmitting/receiving device having characteristics is obtained.

以下、図面を用いて詳しい説明を行う。第1図
は本発明における秘話送信装置、第2図は、本発
明における秘話受信装置の実施例のブロツク図で
ある。送信すべきアナログ信号は入力端子1から
入力されて、秘話変換回路2から入力され、秘話
のための変換が行なわれている。秘話変換は具体
的にはどのような変換でもよく、例えば、入力信
号を複数の帯域に分割して入れ換える帯域分割入
れ換え方式などが考えられる。このとき、入れ換
え方には多数の組み合わせが考えられる。この組
み合わせを選択する信号として、乱数系列発生回
路3の出力信号を入力とする離散的数値発生回路
4を用いる。この回路は例えば、第3図のよう
に、実現できる。乱数系列は入力端子31より入
力され、順次シフトレジスタの各段32,33,
34に格納される。今、乱数系列として2値の信
号を考えれば、この回路では3段のシフトレジス
タを使用しているので、合計8とおりの組み合わ
せ方が得られる。同図で変換回路35は、シフト
レジスタの内容に応じて秘話変換回路の制御信号
を出力端子36に発生させ、これを秘話変換回路
2の制御信号入力とするものである。
A detailed explanation will be given below using the drawings. FIG. 1 is a block diagram of an embodiment of a confidential message transmitting device according to the present invention, and FIG. 2 is a block diagram of an embodiment of a confidential message receiving device according to the present invention. An analog signal to be transmitted is inputted from an input terminal 1 and then inputted from a confidential conversion circuit 2, where conversion for confidential communication is performed. Specifically, the secret conversion may be any type of conversion; for example, a band division/exchange method may be used in which the input signal is divided into a plurality of bands and exchanged. At this time, many combinations can be considered for the replacement method. As a signal for selecting this combination, a discrete number generation circuit 4 is used which receives the output signal of the random number sequence generation circuit 3 as an input. This circuit can be realized, for example, as shown in FIG. The random number series is inputted from the input terminal 31 and is sequentially input to each stage 32, 33,
34. Now, if we consider a binary signal as a random number series, this circuit uses a three-stage shift register, so a total of eight combinations can be obtained. In the figure, the conversion circuit 35 generates a control signal for the secret conversion circuit at an output terminal 36 in accordance with the contents of the shift register, and uses this as a control signal input to the secret conversion circuit 2.

乱数系列発生回路3の出力信号の一部は、暗号
化回路5に入力され暗号化された出力が得られ
る。暗号化回路の実現法は例えば、第4図aのよ
うな自己同期暗号化法が考えられる。乱数系列は
入力端子41より入力され、N値信号の場合には
Nを法とする加算回路42によつて、別途説明す
る関数発生回路46の出力信号との加算が行わ
れ、出力端子47より出力される。それと同時
に、出力信号の一部はシフトレジスタ43,4
4,45に順次入力される。関数発生回路46は
各シフトレジスタの内容によつて一義的に定まる
信号を発生させるものである。その詳しい動作
は、暗号技術などでよく知られているので、ここ
では説明しない。ここで、秘話受信装置の暗号復
号化回路25(第2図)の動作を第4図bを用い
て説明しておく。後で説明するように、暗号化回
路の出力系列は、受信側において、暗号復号化回
路の入力端子48に受信される。受信信号系列は
一部シフトレジスタ43,44,45に順次入力
されるとともに、先に説明した関数発生回路46
の出力と加算回路42によつて加算され、暗号化
回路5に入力されたのと同じ信号系列が得られ
る。この動作は、回路実現が最も容易である2値
(0,1)の信号系列を考えると理解しやすい。
今、信号遅延を無視すれば、暗号化回路5および
暗号復号化回路25のシフトレジスタ43,4
4,45にはそれぞれ同じ値が格納されている。
したがつて、各々の関数発生回路46の出力も同
じ値を発生することになる。暗号化回路の入力端
子41に入力された信号に対して、0あるいは1
の値が2度続けて加算されることになる。2を法
とする加算においてはよく知られているように、
入力信号に0を2度加算しても、あるいは1を2
度加算しても、その値は変化しない。したがつ
て、復号化回路の出力端49には、暗号化回路の
入力信号と同じ系列が得られる。盗聴しようとす
るものが仮に暗号化回路を出力信号を通信の途中
で知り得たとしても、暗号復号化回路の動作、特
に、関数発生回路46の動作を知らなければ、も
との信号を知ることはできない。以上説明した暗
号化回路および復号化回路の動作は、従来の暗
号、復号技術と何ら変わるものではなく、従来の
技術がそのまま使える。
A part of the output signal of the random number sequence generation circuit 3 is input to the encryption circuit 5 and an encrypted output is obtained. A possible method for implementing the encryption circuit is, for example, a self-synchronized encryption method as shown in FIG. 4a. A random number sequence is inputted from an input terminal 41, and in the case of an N-value signal, an addition circuit 42 modulo N performs addition with an output signal of a function generation circuit 46, which will be explained separately, and a random number sequence is inputted from an output terminal 47. Output. At the same time, part of the output signal is transferred to shift registers 43 and 4.
4 and 45 are input sequentially. The function generating circuit 46 generates a signal uniquely determined by the contents of each shift register. The detailed operation is well known from cryptography and other fields, so it will not be explained here. Here, the operation of the encryption/decryption circuit 25 (FIG. 2) of the confidential message receiving apparatus will be explained using FIG. 4b. As will be explained later, the output sequence of the encryption circuit is received at the input terminal 48 of the encryption and decryption circuit on the receiving side. Part of the received signal sequence is sequentially input to shift registers 43, 44, and 45, and is also input to the function generation circuit 46 described earlier.
is added to the output by the adder circuit 42, and the same signal sequence as input to the encryption circuit 5 is obtained. This operation is easy to understand when considering a binary (0, 1) signal sequence, which is the easiest to implement in a circuit.
Now, if we ignore the signal delay, the shift registers 43 and 4 of the encryption circuit 5 and the encryption/decryption circuit 25
The same value is stored in 4 and 45, respectively.
Therefore, the outputs of each function generating circuit 46 will also generate the same value. 0 or 1 for the signal input to the input terminal 41 of the encryption circuit.
The value of will be added twice in a row. As is well known in addition modulo 2,
Even if you add 0 twice to the input signal, or add 1 twice
Even if you add degrees, the value does not change. Therefore, the same sequence as the input signal of the encryption circuit is obtained at the output terminal 49 of the decryption circuit. Even if someone attempting to eavesdrop can learn the output signal of the encryption circuit during communication, if they do not know the operation of the encryption/decryption circuit, especially the operation of the function generation circuit 46, they will not be able to know the original signal. It is not possible. The operations of the encryption circuit and decryption circuit described above are no different from conventional encryption and decryption techniques, and the conventional techniques can be used as is.

再び第1図にもどる。秘話変換回路2の出力の
秘話信号は、暗号化回路5の出力信号とともに、
合成回路6によつて合成されたのち、出力端子7
から送信される。ここで、合成回路6は、例え
ば、第5図に示したように、周波数軸で分離して
合成することが考えられる。同図aは、秘話アナ
ログ信号の電力スペクトルであり、同図bは暗号
化された離散的信号で変調された信号のスペクト
ルである。ここで、変調は、周波数帯を分離する
ために行つたものであり、必ずしも必要ではな
く、単なる周波数変換であつてもよい。合成方法
はその他時間軸で分離するなども考えられ、いず
れにせよ、受信側で再び2つの信号を分離できる
方法であればどのような方法でもよい。
Return to Figure 1 again. The secret message signal output from the secret message conversion circuit 2, together with the output signal from the encryption circuit 5,
After being synthesized by the synthesis circuit 6, the output terminal 7
Sent from. Here, it is conceivable that the synthesis circuit 6 separates and synthesizes on the frequency axis, as shown in FIG. 5, for example. Figure a shows the power spectrum of the confidential analog signal, and Figure b shows the spectrum of the signal modulated with the encrypted discrete signal. Here, modulation is performed to separate frequency bands, and is not necessarily necessary, and may be simple frequency conversion. Other methods of combining may be considered, such as separation on the time axis; in any case, any method may be used as long as the two signals can be separated again on the receiving side.

第2図は前述したように本発明における秘話受
信装置の実施例を示すブロツク図である。入力端
子21に受信された信号は、信号分離回路26に
よつて、送信側で合成された秘話アナログ信号と
暗号化された離散的信号が得られる。具体的に
は、例えば、第5図に示したように周波数軸上で
分離して合成されている場合には、低域通過フイ
ルタおよび高域通過フイルタによつて分離でき
る。離散的信号によつて変調が行われている場合
には、復調も行うものとする。
As mentioned above, FIG. 2 is a block diagram showing an embodiment of the confidential message receiving apparatus according to the present invention. The signal received at the input terminal 21 is processed by the signal separation circuit 26 into a confidential analog signal combined on the transmitting side and an encrypted discrete signal. Specifically, for example, when the signals are separated and combined on the frequency axis as shown in FIG. 5, they can be separated using a low-pass filter and a high-pass filter. If modulation is performed using a discrete signal, demodulation shall also be performed.

暗号化された離散的信号は暗号復号化回路25
によつて復号され、送信した乱数系列が得られ
る。この乱数系列は離散的数値発生回路24に加
えられ、その出力は秘話逆変換回路22の制御入
力となる。ここで、離散的数値発生回路は、例え
ば、第3図で示したものと同じように動作し、レ
ジスタ32,33,34の内容は送信側で秘話変
換を行つた際のレジスタの中味と同じである。し
たがつて、同一のレジスタ内容に対して送信側と
受信側離散的数値発生回路の内容を、秘話変換が
逆変換で元にもどるような数値に定めておけばよ
い。送信アナログ信号は、秘話逆変換回路22の
出力として、出力端子27に得られる。
The encrypted discrete signal is sent to the encryption/decryption circuit 25.
The transmitted random number sequence is obtained. This random number sequence is applied to the discrete number generation circuit 24, and its output becomes the control input of the confidential speech inverse conversion circuit 22. Here, the discrete numerical value generation circuit operates in the same manner as shown in FIG. It is. Therefore, for the same register contents, the contents of the discrete numerical value generation circuits on the transmitting side and the receiving side may be determined to be such numerical values that the secret conversion returns to the original value by inverse conversion. The transmitted analog signal is obtained at the output terminal 27 as the output of the private speech inverse conversion circuit 22.

以上述べたように、本発明において、秘話変換
を行つた際の離散的情報を暗号化して送信して、
受信側において、暗号を復号化して得られた情報
によつて秘話逆変換を行う。従つて、何ら同期情
報を伝送する必要がない。そのために、従来技術
のように、同期確立のために要する時間あるい
は、同期回路が不要になる効果がある。また同期
をとる必要がないため、使用できる乱数系列に制
限がなく、例えば物理的雑音から発生された乱数
系列を使用できるなど、秘話鍵が無限に近くとれ
る効果がある。
As described above, in the present invention, the discrete information upon performing secret conversion is encrypted and transmitted.
On the receiving side, secret speech inverse conversion is performed using the information obtained by decoding the code. Therefore, there is no need to transmit any synchronization information. Therefore, there is an effect that the time required to establish synchronization or the synchronization circuit as in the prior art is not required. Furthermore, since there is no need for synchronization, there is no limit to the random number sequences that can be used; for example, random number sequences generated from physical noise can be used, which has the effect of making it possible to obtain an almost infinite number of private keys.

本発明で用いる乱数系列発生回路は、何ら限定
する必要がなく、例えば、送信すべきデータ信
号、あるいはこれを暗号化した信号を用いてもよ
い。このときには、受信側の暗号復号器の出力に
は送信したデータ信号が得られるので、会話を行
いながら、データ伝送も行えるという効果もあ
る。従来の秘話方式では、例えば第5図bの部分
には、同期信号を送つているので、この部分の帯
域をみすみす損したのであるが、この場合には、
この帯域もデータ伝送として、有効に利用してい
ることになる。
The random number sequence generation circuit used in the present invention does not need to be limited in any way, and may use, for example, a data signal to be transmitted or a signal obtained by encrypting the data signal. At this time, since the transmitted data signal is obtained as the output of the decryptor on the receiving side, there is also the effect that data transmission can be performed while having a conversation. In the conventional confidential communication system, for example, a synchronization signal is sent to the part (b) in Figure 5, so the band in this part is wasted, but in this case,
This band is also effectively used for data transmission.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は、本発明の秘話送受信装置を構成する
秘話送信装置の実施例を示すブロツク図、第2図
は、本発明の秘話送受信装置を構成する秘話受信
装置の実施例を示すブロツク図、第3図は、本発
明に用いる離散的数値発生回路の実施例を示すブ
ロツク図、第4図aは、秘話送信装置で用いる暗
号化回路、第4図bは、秘話受信装置で用いる暗
号復号化回路を示すブロツク図、第5図は、本発
明に用いる信号合成回路の例の動作を示すスペク
トル図である。 これらの図において、1,31,41は信号入
力端子、7,27,36,47,49は信号出力
端子、2は秘話変換回路、3は乱数発生回路、
4,24は離散的数値発生回路、5は暗号化回
路、6は合成回路、26は分離回路、25は暗号
復号化回路、22は秘話逆変換回路、32,3
3,34,43,44,45はレジスタ、35は
変換回路、42は加算回路、46は関数発生回路
である。
FIG. 1 is a block diagram showing an embodiment of a confidential message transmitting device constituting a confidential message transmitting/receiving device of the present invention, and FIG. 2 is a block diagram showing an embodiment of a confidential message receiving device constituting a confidential message transmitting/receiving device of the present invention. FIG. 3 is a block diagram showing an embodiment of a discrete numerical value generating circuit used in the present invention, FIG. 4a is an encryption circuit used in a confidential message transmitting device, and FIG. FIG. 5 is a spectral diagram showing the operation of an example of the signal combining circuit used in the present invention. In these figures, 1, 31, 41 are signal input terminals, 7, 27, 36, 47, 49 are signal output terminals, 2 is a secret conversion circuit, 3 is a random number generation circuit,
4 and 24 are discrete numerical value generation circuits, 5 is an encryption circuit, 6 is a synthesis circuit, 26 is a separation circuit, 25 is an encryption/decryption circuit, 22 is a private message inverse conversion circuit, 32, 3
3, 34, 43, 44, and 45 are registers, 35 is a conversion circuit, 42 is an addition circuit, and 46 is a function generation circuit.

Claims (1)

【特許請求の範囲】 1 乱数系列を発生させる手段と、該乱数系列に
よつて発生される離散値に対応して、送信すべき
アナログ信号に秘話変換を行う手段と、前記乱数
系列を暗号化する自己同期型の暗号器と、該暗号
器から得られる離散的信号と前記秘話変換を行う
手段から得られるアナログ信号とを合成して得ら
れる信号を送信する手段とを有する秘話送信装置
と、 前記秘話送信装置で行つた前記アナログ信号と
前記離散的信号の合成の逆操作を行うことにより
前記アナログ信号と前記離散的信号とを分離する
手段と、前記離散的信号の暗号復号化を行う復号
器と、該復号器から得られる信号によつて離散的
信号を発生させ、これに対応して、前記秘話送信
装置で行つた秘話変換の逆操作を行う手段とを有
し、これから得られる信号を受信アナログ信号と
することを特徴とする秘話受信装置と、 からなる秘話送受信装置。 2 前記秘話交換を行う手段で秘話交換を行うた
めに発生させる離散値が、乱数系列をブロツク単
位に区切ることなく連続して入力されることによ
つて発生される特許請求の範囲第1項記載の秘話
送受信装置。
[Claims] 1. Means for generating a random number sequence, means for performing secret conversion into an analog signal to be transmitted in correspondence with discrete values generated by the random number sequence, and encrypting the random number sequence. a self-synchronized encryptor, and means for transmitting a signal obtained by combining a discrete signal obtained from the encryptor and an analog signal obtained from the means for performing the encrypting conversion; means for separating the analog signal and the discrete signal by performing a reverse operation of the synthesis of the analog signal and the discrete signal performed by the confidential transmission device; and a decoder for decoding the discrete signal. and a means for generating a discrete signal using the signal obtained from the decoder, and correspondingly performing an inverse operation of the encrypted speech conversion performed by the encrypted speech transmitter, and a signal obtained from the discrete signal. A secret message transmitting/receiving device comprising: a confidential message receiving device characterized in that the received analog signal is a confidential message receiving device; and a confidential message transmitting and receiving device. 2. The discrete values generated for exchanging secret information by the means for exchanging secret information are generated by continuously inputting a random number sequence without dividing it into blocks. Confidential transmission/reception device.
JP21670982A 1982-12-10 1982-12-10 Method and apparatus of private talk Granted JPS59107658A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP21670982A JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk
AU22257/83A AU561204B2 (en) 1982-12-10 1983-12-09 Voice encryption and decryption system
CA000442943A CA1206528A (en) 1982-12-10 1983-12-09 Voice encryption and decryption system
GB08332970A GB2132857B (en) 1982-12-10 1983-12-09 Voice encryption and decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP21670982A JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk

Related Child Applications (1)

Application Number Title Priority Date Filing Date
JP4052288A Division JPH0756975B2 (en) 1992-03-11 1992-03-11 Confidential receiver

Publications (2)

Publication Number Publication Date
JPS59107658A JPS59107658A (en) 1984-06-21
JPH0527291B2 true JPH0527291B2 (en) 1993-04-20

Family

ID=16692686

Family Applications (1)

Application Number Title Priority Date Filing Date
JP21670982A Granted JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk

Country Status (4)

Country Link
JP (1) JPS59107658A (en)
AU (1) AU561204B2 (en)
CA (1) CA1206528A (en)
GB (1) GB2132857B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2151886A (en) * 1983-12-21 1985-07-24 British Broadcasting Corp Conditional-access broadcast transmission
US5351297A (en) * 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
US5272755A (en) * 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5442707A (en) * 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
US5712912A (en) * 1995-07-28 1998-01-27 Mytec Technologies Inc. Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
US5740276A (en) * 1995-07-27 1998-04-14 Mytec Technologies Inc. Holographic method for encrypting and decrypting information using a fingerprint
US6289314B1 (en) * 1996-09-18 2001-09-11 Matsushita Electric Industrial Co., Ltd. Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals
DE19715644A1 (en) * 1997-04-15 1998-10-22 Iks Gmbh Information Kommunika Identity verification procedures
CA2203212A1 (en) 1997-04-21 1998-10-21 Vijayakumar Bhagavatula Methodology for biometric encryption
KR100611955B1 (en) * 1999-07-20 2006-08-11 삼성전자주식회사 Scrambler
US7841539B2 (en) 2007-02-15 2010-11-30 Alfred Hewton Smart card with random temporary account number generation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5382101A (en) * 1976-12-27 1978-07-20 Nissin Electric Co Ltd Method of transmitting signal
JPS56143744A (en) * 1980-04-09 1981-11-09 Nec Corp Data interchanging system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4052565A (en) * 1975-05-28 1977-10-04 Martin Marietta Corporation Walsh function signal scrambler
US4341925A (en) * 1978-04-28 1982-07-27 Nasa Random digital encryption secure communication system
GB2042849B (en) * 1979-02-20 1983-04-13 Payview Ltd Encoding of information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5382101A (en) * 1976-12-27 1978-07-20 Nissin Electric Co Ltd Method of transmitting signal
JPS56143744A (en) * 1980-04-09 1981-11-09 Nec Corp Data interchanging system

Also Published As

Publication number Publication date
GB8332970D0 (en) 1984-01-18
GB2132857A (en) 1984-07-11
AU2225783A (en) 1984-06-14
CA1206528A (en) 1986-06-24
GB2132857B (en) 1986-09-03
JPS59107658A (en) 1984-06-21
AU561204B2 (en) 1987-04-30

Similar Documents

Publication Publication Date Title
US5727064A (en) Cryptographic system for wireless communications
US5214703A (en) Device for the conversion of a digital block and use of same
JP2761281B2 (en) Encrypted communication method for multi-carrier communication system
JPH0527291B2 (en)
JPH0918469A (en) Equipment and system for cipher communication and ciphering device
US20060147041A1 (en) DES algorithm-based encryption method
EP1994672B1 (en) Method and apparatus for synchronous stream cipher encryption with reserved codes
WO2004040837A1 (en) Data processing device and data reception processing device
JP3202544B2 (en) Encryption communication device and encryption device
US5029210A (en) Cooperative communication system
RU2653470C1 (en) Method of the cryptogram transmission in the communication system and the device for its implementation
JPH0756975B2 (en) Confidential receiver
RU2730397C2 (en) Device for encrypted transmission of messages with short aging time of information
RU2108002C1 (en) Device for information encryption-decryption
JP2000101567A (en) Ciphering and deciphering device and method therefor
JPS6054542A (en) Method and device of private talking
JPS5970039A (en) Ciphering transmission system
JPH03230637A (en) Privacy communication system and transmitter-receiver
RU2204886C2 (en) Method and device for error-correction encryption of communication channel
JPH077941B2 (en) Secret story method
JPS63308432A (en) Sequence generating method
JPS6037585A (en) Data feedback type cryptographer
JPH057202A (en) Enciphering communication equipment and enciphering transmission system
JPH01149636A (en) Privacy telephone system
JPH08293915A (en) Telephone set with cryptographic function